Across
- 3. DDoS An attack where the attacker sends spoofed requests to servers which then send responses to the victim, overwhelming it.
- 5. Measures and technologies used to defend networks and servers against DDoS attacks.
- 7. A security vulnerability exploited by attackers before it is discovered or patched by the manufacturer.
- 9. A technique where an attacker uses forged IP addresses to obscure the source of a DDoS attack.
- 10. The person or group behind the control and coordination of a botnet for DDoS attacks.
Down
- 1. DDoS An attack that leverages servers' high-bandwidth responses to overwhelm the victim.
- 2. A method where network traffic to the victim during a DDoS attack is redirected to mitigate the attack.
- 4. A group of infected computers controlled remotely by an attacker to perform DDoS attacks.
- 6. A computer or device controlled remotely by an attacker without the owner's knowledge to participate in DDoS attacks.
- 8. Flood A method where an attacker floods the target network with a high volume of data packets to overload it.
